Universally composable two-party and multi-party secure computation

From MaRDI portal
Revision as of 02:43, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3579187

DOI10.1145/509907.509980zbMath1192.94112OpenAlexW2113085788MaRDI QIDQ3579187

Rafail Ostrovsky, Amit Sahai, Yehuda Lindell, Ran Canetti

Publication date: 5 August 2010

Published in: Proceedings of the thiry-fourth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/509907.509980




Related Items (only showing first 100 items - show all)

Witness-succinct universally-composable SNARKsRound-optimal oblivious transfer and MPC from computational CSIDHA universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)PAPR: publicly auditable privacy revocation for anonymous credentialsLattice-based zero-knowledge proofs and applications: shorter, simpler, and more generalTriply adaptive UC NIZKTwo-round adaptively secure MPC from isogenies, LPN, or CDHA new approach to efficient non-malleable zero-knowledgeEndemic oblivious transfer via random oracles, revisitedCompleteness theorems for adaptively secure broadcastOn concurrent multi-party quantum computationEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsCryptography and cryptographic protocolsAn Algebraic Approach to NonmalleabilityEfficient non-malleable commitment schemesBetter Two-Round Adaptive Multi-party ComputationConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelRemoving Erasures with Explainable Hash Proof SystemsConcurrently Composable Security with Shielded Super-Polynomial SimulatorsMagic Adversaries Versus Individual Reduction: Science Wins Either WayEfficient non-malleable commitment schemesZero-knowledge proofs for set membership: efficient, succinct, modularAlmost Optimal Oblivious Transfer from QA-NIZKEfficient Composable Oblivious Transfer from CDH in the Global Random Oracle ModelEquivocal Blind Signatures and Adaptive UC-SecurityFrom fairness to full security in multiparty computationMulti-theorem preprocessing NIZKs from latticesSecure computation of the median (and other elements of specified ranks)David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof HardwareAdaptively secure MPC with sublinear communication complexityUniversally Composable Security Analysis of TLSRound Optimal Universally Composable Oblivious Transfer ProtocolsMultiparty generation of an RSA modulusConditional Reactive SimulatabilityOn the concurrent composition of quantum zero-knowledgeTwo-round adaptively secure multiparty computation from standard assumptionsRound-optimal fully black-box zero-knowledge arguments from one-way permutationsRound optimal black-box ``commit-and-proveConstant-round leakage-resilient zero-knowledge from collision resistanceSignatures of Knowledge for Boolean Circuits Under Standard AssumptionsSignatures of knowledge for Boolean circuits under standard assumptionsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityCross and Clean: Amortized Garbled Circuits with Constant OverheadUC-secure and Contributory Password-Authenticated Group Key ExchangeZero-knowledge proofs for set membership: efficient, succinct, modularAnother look at extraction and randomization of Groth's zk-SNARKA Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious TransferSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsOn black-box extension of a non-interactive zero-knowledge proof system for secret equalityPribank: confidential blockchain scaling using short commit-and-proof NIZK argumentAn improved affine equivalence algorithm for random permutationsEverlasting UC commitments from fully malicious PUFsUniversally composable subversion-resilient cryptographyPractical non-interactive publicly verifiable secret sharing with thousands of partiesAdaptively secure computation for RAM programsLong-term security and universal composabilityUC priced oblivious transfer with purchase statistics and dynamic pricingCompact and Efficient UC Commitments Under Atomic-ExchangesSecure Protocols with Asymmetric TrustAdaptive Oblivious Transfer and GeneralizationStructure-Preserving Smooth Projective Hashing(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensLower bounds and impossibility results for concurrent self compositionA novel quantum anonymous ranking protocolConstant-round adaptive zero-knowledge proofs for NPEfficient and round-optimal oblivious transfer and commitment with adaptive securityNon-committing encryption with constant ciphertext expansion from standard assumptionsPractical exact proofs from lattices: new techniques to exploit fully-splitting ringsUniversally Composable Undeniable SignatureComposable Security in the Bounded-Quantum-Storage ModelAdaptive security of multi-party protocols, revisitedEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsImpossibility results for universal composability in public-key models and with fixed inputsRound-efficient black-box construction of composable multi-party computationA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortResource fairness and composability of cryptographic protocolsAdaptive zero-knowledge proofs and adaptively secure oblivious transferSecure computation without authenticationSpin-the-bottle sort and annealing sort: oblivious sorting via round-robin random comparisonsWhen Is a Semi-honest Secure Multiparty Computation Valuable?A novel protocol for multiparty quantum key managementQuantum private comparison over noisy channelsThe reactive simulatability (RSIM) framework for asynchronous systemsAll-but-many encryptionA full proof of the BGW protocol for perfectly secure multiparty computationEfficient one-sided adaptively secure computationOn the (im-)possibility of extending coin tossFeasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSCryptography Using Captcha PuzzlesUnifying simulatability definitions in cryptographic systems under different timing assumptionsPerfect Non-interactive Zero Knowledge for NPOn the (Im-)Possibility of Extending Coin TossUniversally Composable Adaptive Oblivious TransferModular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk modelA post-quantum UC-commitment scheme in the global random oracle model from code-based assumptionsGeneric Construction of UC-Secure Oblivious TransferOn the Complexity of Additively Homomorphic UC CommitmentsRound-preserving parallel composition of probabilistic-termination cryptographic protocolsGNUC: a new universal composability framework







This page was built for publication: Universally composable two-party and multi-party secure computation